Trending

#Bugbounty

Latest posts tagged with #Bugbounty on Bluesky

Latest Top
Trending

Posts tagged #Bugbounty

Swipe through the first post to learn how to extract endpoints from mobile apps to test for BAC flaws!

#BugBounty #HackWithIntigriti #BugQuest

0 0 0 0
Preview
Google paid $17.1 million for vulnerability reports in 2025 Google paid over $17 million to 747 security researchers who reported security bugs through its Vulnerability Reward Program (VRP) in 2025. [...]

#Google paid $17.1 million for vulnerability reports in 2025

www.bleepingcomputer.com/news/google/google-paid-...

#cybersecurity #BugBounty

0 0 0 0

Even when introspection is disabled, GraphQL's auto-complete error messages will suggest correct field names when you send typos.

Swipe through to learn how to extract complete API schemas from GraphQL endpoints!

#BugBounty #HackWithIntigriti #BugQuest

0 0 0 0
AI in Vulnerability Discovery

~Akamai~
AI-generated false positives are overwhelming bug bounty programs and CVE databases, requiring strict human oversight.
-
IOCs: (None identified)
-
#AI #BugBounty #ThreatIntel

0 0 0 0

📰 Google Bayar $17,1 Juta untuk Laporan Kerentanan Keamanan Sepanjang 2025

👉 Baca artikel lengkap di sini: ahmandonk.com/2026/03/14/bug-bounty-go...

#bugBounty #cyberSecurity #google #keamananSiber #vulnerability

0 0 0 0
Post image

Google Paid $17.1M For Bugs In 2025
Read More: buff.ly/sGUNuDf

#BugBounty #GoogleVRP #VulnerabilityResearch #SecurityResearchers #ResponsibleDisclosure #CyberInnovation #AppSec #Infosec

0 0 0 0

These external sources can reveal endpoints that haven't been referenced before in your target, but do exist and work in production.

Swipe through to learn where to search and what to look for!

#BugBounty #HackWithIntigriti #BugQuest

0 1 0 0
Post image

Google achieved a record-breaking $17.1 million in bug bounty payouts through its Vulnerability Reward Program in 2025

#Google #BugBounty

1 0 0 0

🎧 www.youtube.com/watch

#GoogleVRP #BugBounty #CloudSecurity #GCP (2/2)

0 0 0 0

funny how “internal only” endpoints always seem to show up on the internet. #bugbounty

1 0 0 0
Preview
#security #cybersecurity #entraid #oidc #bugbounty #microsoftsecurity #community #meetup #sigmatechnology #wemaketechnologyusable #norway | Robert Eriksson Great evening at the Microsoft Security User Group Norway × Security Champions Norway meetup yesterday! 🌃 Huge thanks to Cody Burkard, Nora Tomas, and Sti͛an Kvå̔lshаgen for insightful talks-from OID...

Great evening at the Microsoft Security User Group Norway × Security Champions Norway meetup yesterday! 🌃

🔗 www.linkedin.com/posts/roberi...

#Security #CyberSecurity #EntraID #OIDC #BugBounty #MicrosoftSecurity #Community #Meetup #MSUGN #SigmaTechnology #WeMakeTechnologyUsable #Norway

1 0 0 0

Autonomous AI agents are revolutionizing cybersecurity research. Our swarm hunts vulnerabilities 24/7 across DeFi protocols. Learn more at https://api.wingmanprotocol.com #DeFiSecurity #AI #BugBounty

1 0 0 0

When you suspect undocumented endpoints to be present, it's always recommended to further enumerate your target for more endpoints & routes.

Swipe through today's post to learn where to find (& learn to utilize) API docs!

#BugBounty #HackWithIntigriti #BugQuest

0 0 0 0
Preview
Inside the Benchmark: App Architectures, Walkthroughs of Findings, and What Each Scanner Actually Caught This is Part 2 of our vibe coding security benchmark study. In Part 1, we compared how LLM-based security tools like ProjectDiscovery's Neo and Claude Code performed against traditional SAST and DAST scanners on AI-generated code. We found that LLM-based tools like Neo and Claude Code detected many high-value findings that traditional scanners missed. Between Neo and Claude Code, Neo produced more true positives and fewer false positives because it could validate hypotheses against a running app

Originally from ProjectDiscovery: Inside the Benchmark: App Architectures, Walkthroughs of Findings, and What Each Scanner Actually Caught ( :-{ı▓ #projectdiscovey #bugbounty #cyberresearch

0 0 0 0

Follow the redirect chain.
Run curl -v or Burp to watch every hop. Misconfigured 301/302 responses can expose hidden endpoints or open redirect opportunities. #BugBounty

0 0 0 0
Post image Post image

Looking to make some extra cash using your #BugBounty / #ThreatHunting skills? Report security issues and #zerodays through through our website today and maybe make some money- https://linktr.ee/dprkcert

#BTC #0day

1 0 0 0

Tools like LinkFinder and JSParser automate this process, but understanding what to look for can help you spot patterns that automated tools might miss.

Swipe through to see how JS files can include endpoints and how to extract them!

#BugBounty #HackWithIntigriti #BugQuest

1 0 0 0
Post image

Found Reflected XSS on a bug bounty target 🎯

Payload:

<img src=x onerror=prompt(/XSS/)>

Reported responsibly ✅

#BugBounty #XSS #InfoSec

3 0 0 0

Swipe through to learn how to fuzz effectively and build wordlists that actually work!

#BugBounty #HackWithIntigriti #BugQuest

0 0 0 0
Post image Post image

Looking to make some extra cash using your #BugBounty / #ThreatHunting skills? Report security issues and #zerodays through through our website today and maybe make some money- https://linktr.ee/dprkcert

#BTC #0day

2 0 0 0

SSRF isn't just a web vulnerability. If the target is on AWS, you can check the metadata endpoint - 169.254.169.254. Pulling IAM keys from /latest/meta-data/iam/security-credentials/ turns a simple web bug into a full-blown cloud leak. 🌩️ #BugBounty #AWS #CloudSecurity

1 0 1 0
Preview
Bug bounties are broken, and the best security pros are moving on - Help Net Security PTaaS gains support among experienced pentesters as contract testing surpasses bug bounties in workflow, stability, and critical findings.

Bug bounties are broken, and the best security pros are moving on

📖 Read more: www.helpnetsecurity.com/2026/03/10/c...

#cybersecurity #cybersecuritynews #bugbounty #PTaaS #penetrationtesting

0 0 0 0

bug hunting teaches you patience… or caffeine dependency. usually both. #bugbounty

1 0 0 0

Swipe through to see a few examples of config files to check and what they can reveal!

#BugBounty #HackWithIntigriti #BugQuest

0 0 0 0

From common paths and API docs to JavaScript files and mobile apps, there are multiple ways to uncover hidden endpoints that may lack proper authorization checks.

Swipe through to see the main discovery techniques! 👇

#BugBounty #HackWithIntigriti #BugQuest

1 0 0 0
Preview
How to become a bug bounty hunter - Negative PID Many businesses participate in bug bounty hunting programs. Indeed, many skilled people have adopted bug bounty hunting as a full-time job. Here's how.

How to become a bug bounty hunter

negativepid.blog/how...

#bugBounty #bugHunter #careers #tech #Cybersecurity #cyberattacks #cyberThreats #onlineSecurity #negativepid

1 0 0 0
Preview
GitHub - r1cksec/cheatsheets: Collection of knowledge about information security Collection of knowledge about information security - r1cksec/cheatsheets

New cheatsheets pushed

github.com/r1cksec/chea...

#infosec #cybersecurity #redteam #pentest #threatintel #malware #dfir #bugbounty #opensource

2 0 0 0

We'll show you how to find hidden endpoints, enumerate APIs, and uncover the resources you need to test for BAC bugs. This is also where the real fun begins! 💪

#BugBounty #HackWithIntigriti #BugQuest

1 0 0 0

sometimes the PoC is just a screenshot of “oops, unauthorized.” #bugbounty

2 0 0 0

phew, good on the hacker for finding this before the bad guys did. another close call. bug bounties are so important for this. #bugbounty

1 0 0 0